PyDFIR / pyDFIRRamLinks
PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and analysis of memory dumps, allowing users to focus on data rather than commands.
☆28Updated last year
Alternatives and similar repositories for pyDFIRRam
Users that are interested in pyDFIRRam are comparing it to the libraries listed below
Sorting:
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- A repository of credential stealer formats☆233Updated 5 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 8 months ago
- Shellcode loader based on indirect syscall☆22Updated 9 months ago
- Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆133Updated 3 weeks ago
- DFIR project to collect and analyze events in Google Workspace☆13Updated last year
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆129Updated 2 months ago
- Repository of Yara Rules☆128Updated 2 weeks ago
- ☆111Updated 4 months ago
- Powershell Linter☆84Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆201Updated last year
- Source code for complete MALicious softWARE books I & II☆58Updated last month
- ☆136Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆103Updated 2 years ago
- Retired TrustedSec Capabilities☆248Updated 11 months ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Updated last year
- DFIR ORC PARSER PROJECT☆24Updated 2 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆79Updated 6 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated last week
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 11 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆91Updated 2 weeks ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆148Updated 3 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆61Updated last year